Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe
-
Size
952KB
-
MD5
64f32d3a953b98f7dff92e37f8771fa0
-
SHA1
d27fe392cb3ff9fa25a5b98816efa6854d24492f
-
SHA256
395d11ff030f19f9d099d28f23e0388639ff780f004cbcc7bbe88f6249ff4450
-
SHA512
491629a3ce38b3bc7700c7efca4f50c6db8455619e7f4b25edbc885f731978fd22465bc70047411b03c661ed970dbeca379ce776a0cfb8b3e89b322c2e3cd410
-
SSDEEP
12288:byyy7Z3z4I8NXOGjwwG/ZjXsAHHz79p9NM5Tz103j2CF4TxQUOfhVPOSAE//VAci:baCI2OewFJN4mkxyHnnew1SatLRzD
Malware Config
Signatures
-
Darkcomet family
-
Executes dropped EXE 3 IoCs
pid Process 3552 micoffice.exe 1556 micoffice.exe 1608 micoffice.exe -
Loads dropped DLL 7 IoCs
pid Process 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3552 micoffice.exe 3552 micoffice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftOffice\\micoffice.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1484 set thread context of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 3552 set thread context of 1556 3552 micoffice.exe 36 PID 3552 set thread context of 1608 3552 micoffice.exe 37 -
resource yara_rule behavioral1/memory/3320-443-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1556-1023-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/3320-1035-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1556-1043-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micoffice.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1608 micoffice.exe Token: SeSecurityPrivilege 1608 micoffice.exe Token: SeTakeOwnershipPrivilege 1608 micoffice.exe Token: SeLoadDriverPrivilege 1608 micoffice.exe Token: SeSystemProfilePrivilege 1608 micoffice.exe Token: SeSystemtimePrivilege 1608 micoffice.exe Token: SeProfSingleProcessPrivilege 1608 micoffice.exe Token: SeIncBasePriorityPrivilege 1608 micoffice.exe Token: SeCreatePagefilePrivilege 1608 micoffice.exe Token: SeBackupPrivilege 1608 micoffice.exe Token: SeRestorePrivilege 1608 micoffice.exe Token: SeShutdownPrivilege 1608 micoffice.exe Token: SeDebugPrivilege 1608 micoffice.exe Token: SeSystemEnvironmentPrivilege 1608 micoffice.exe Token: SeChangeNotifyPrivilege 1608 micoffice.exe Token: SeRemoteShutdownPrivilege 1608 micoffice.exe Token: SeUndockPrivilege 1608 micoffice.exe Token: SeManageVolumePrivilege 1608 micoffice.exe Token: SeImpersonatePrivilege 1608 micoffice.exe Token: SeCreateGlobalPrivilege 1608 micoffice.exe Token: 33 1608 micoffice.exe Token: 34 1608 micoffice.exe Token: 35 1608 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe Token: SeDebugPrivilege 1556 micoffice.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 3552 micoffice.exe 1556 micoffice.exe 1608 micoffice.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 1484 wrote to memory of 3320 1484 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 31 PID 3320 wrote to memory of 3476 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 32 PID 3320 wrote to memory of 3476 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 32 PID 3320 wrote to memory of 3476 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 32 PID 3320 wrote to memory of 3476 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 32 PID 3476 wrote to memory of 3528 3476 cmd.exe 34 PID 3476 wrote to memory of 3528 3476 cmd.exe 34 PID 3476 wrote to memory of 3528 3476 cmd.exe 34 PID 3476 wrote to memory of 3528 3476 cmd.exe 34 PID 3320 wrote to memory of 3552 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 35 PID 3320 wrote to memory of 3552 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 35 PID 3320 wrote to memory of 3552 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 35 PID 3320 wrote to memory of 3552 3320 JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe 35 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1556 3552 micoffice.exe 36 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37 PID 3552 wrote to memory of 1608 3552 micoffice.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64f32d3a953b98f7dff92e37f8771fa0.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HGUBK.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msoffice" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3528
-
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"C:\Users\Admin\AppData\Roaming\MicrosoftOffice\micoffice.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD5f07b93136766adced3c6f0d74d869da0
SHA1787c530f33687d758b41295e01d7a9a1bba3a467
SHA256cd603067047c028fe12d4b099d13b3681dd698d25bc32474184e9d8edd3ed701
SHA512050105a5f14939a37f653421b24959cc90cb082b20df5bb1a81335fd0ad5e70c740b43f1d6df0fc7324551425894668acc3af0c533c7d90ff149d84e844c2d10
-
Filesize
952KB
MD5a6956a120ace8810bea2693d3c969f7e
SHA1d26937958fe4734894e6fc56d73a54fa9a37b401
SHA256690279fdc9c92bdb3db673bcc10c488d37a59910a1cd215ca064bb43c8a3af2b
SHA51238bad6f28547adf3f8d0eb74e580381c65cf7cf6a02d375f6179de7cd6f0f9adf37b769c04320f96a6f8067f3a71293f92b854000235c38fe97ba441ab4844b2